Principles of Information Systems (MindTap Course List)
13th Edition
ISBN: 9781305971776
Author: Ralph Stair, George Reynolds
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 4.1, Problem 1RQ
Program Plan Intro
Personal sphere of influence:
- This sphere of influence help the needs of single users.
- It also help the users to increase their individual effectiveness, improving the amount and quality of work they are able do.
- This sphere of influence is also known as personal productivity software.
- Example for personal productivity software is VIP organizer.
- This software help users develop to do lists, categorize tasks, save notes and records in a single
database .
- The following
operating systems are supported by personal sphere of influence,- Microsoft windows.
- Mac OS X, iOS.
- Linux.
- Google Android, chrome OS.
- HP webOS.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Read carefully the following case:Imagine that you work as an internal auditor for a company that owns several pharmacies throughout the city. Based on your audit plan, the first cycle to audit will be revenue. The first thing you do is document the processes related to receiving and processing the various sources of income. On your initial visit, you were able to observe the following:Once customers have the items to purchase, they head to the register, where a clerk processes the sale. The pharmacy has three cash registers, but does not have an employee who specifically works as a cashier at each one. This provides flexibility in the operation because, of the three employees that the business has, one can collect at any of the cashiers when available. By not having to leave a single person as a cashier, the cashier can focus on providing more direct customer service, refilling merchandise on the shelves, and even assisting in receiving or dispatching merchandise from the store.At the…
Create an ER Diagram for the following scenario. Please state any assumptions you have madein your answer.A university offers a Mathematics program. This program can offer any amount ofcourses in a semester. Each course has a roster limit, location and time slot. A studentcan be registered for any number of courses in a semester but to register for a coursethey must have a valid student ID and address. Each course is assigned a singleprofessor. Only on completion of a course, a student receives a final grade for thatcourse.
1
Suppose you are a manager of an event management company. Your team is responsible for
running various events. Each event, depending on its nature, runs for varied lengths. Your
company policy is such that you charge a flat amount for each event your team is managing
(irrespective of the duration a particular event). The size of the team that you are running is such
that your team can manage to run one event at a particular time i.e. your company is unable to
run multiple events at a particular time. More formally, if there are two events i and j, the events
are mutually compatible (i.e. you can select both i and j) if s>f, or s,>f, where s, and
f, are the start and finish time of the event i.
You are required to select events that your team is going to manage so that you can maximize the
profit for your company.
The following table shows some candidate events for your company to manage for a particular
day. Find out which events would you select such that you can maximize the profit…
Chapter 4 Solutions
Principles of Information Systems (MindTap Course List)
Ch. 4.1 - Prob. 1RQCh. 4.1 - Prob. 2RQCh. 4.1 - Prob. 1CTQCh. 4.1 - Prob. 2CTQCh. 4.2 - Prob. 1RQCh. 4.2 - Prob. 2RQCh. 4.2 - Prob. 1CTQCh. 4.2 - Prob. 2CTQCh. 4.3 - Prob. 1RQCh. 4.3 - Prob. 2RQ
Ch. 4.3 - Prob. 1CTQCh. 4.3 - Prob. 2CTQCh. 4.4 - What is the primary difference between purchasing...Ch. 4.4 - What are the pros and cons of using open-source...Ch. 4.4 - What risks and start-up issues are associated with...Ch. 4.4 - Prob. 2CTQCh. 4 - Prob. 1SATCh. 4 - Prob. 2SATCh. 4 - Prob. 3SATCh. 4 - Prob. 4SATCh. 4 - Prob. 5SATCh. 4 - Prob. 6SATCh. 4 - Prob. 7SATCh. 4 - Prob. 8SATCh. 4 - Prob. 9SATCh. 4 - Prob. 10SATCh. 4 - ______ is software that makes its source code...Ch. 4 - Software ______ are an important source of...Ch. 4 - Identify and briefly discuss the three spheres of...Ch. 4 - Prob. 2RQCh. 4 - Prob. 3RQCh. 4 - What is the kernel of the operating system?Ch. 4 - Prob. 5RQCh. 4 - Prob. 6RQCh. 4 - Prob. 7RQCh. 4 - Prob. 8RQCh. 4 - Prob. 9RQCh. 4 - Distinguish between proprietary software and...Ch. 4 - Prob. 11RQCh. 4 - Prob. 12RQCh. 4 - Prob. 13RQCh. 4 - Prob. 14RQCh. 4 - Prob. 15RQCh. 4 - Prob. 16RQCh. 4 - Prob. 1DQCh. 4 - Assume that you must take a computer-programming...Ch. 4 - Prob. 3DQCh. 4 - Prob. 4DQCh. 4 - Prob. 5DQCh. 4 - Prob. 6DQCh. 4 - Prob. 7DQCh. 4 - Prob. 8DQCh. 4 - Prob. 9DQCh. 4 - Prob. 10DQCh. 4 - Prob. 1PSECh. 4 - Prob. 2PSECh. 4 - Prob. 3PSECh. 4 - Prob. 1TACh. 4 - Prob. 1WECh. 4 - Do research on the Web to learn which programming...Ch. 4 - Prob. 3WECh. 4 - Prob. 1CECh. 4 - Prob. 2CECh. 4 - Think of your ideal job. Identify two existing...Ch. 4 - Prob. 1CTQ1Ch. 4 - Prob. 2CTQ1Ch. 4 - Prob. 3CTQ1Ch. 4 - Prob. 1CTQ2Ch. 4 - Prob. 2CTQ2Ch. 4 - Prob. 3CTQ2
Knowledge Booster
Similar questions
- Do not use any Al to do this question. Please show the diagram at the end. Question Lekker Living is a new backpackers that recently opened close to Stellenbosch. They have a limited number of staff (including a receptionist, a cook, and a housekeeper) since they have limited rooms available. If foreign travelers are looking for a place to stay a few nights while exploring the wonderful wine farms and hiking trails in Stellenbosch, they need to check availability on the website. If there is space, they must call reception to book a room. Orice they arrive, they check in at the front desk. In the evenings, they have the option to enjoy an assortment of dishes, prepared by a cook. Guests can also request for the room to be cleaned by a housekeeper in the mornings, while they are out and about exploring. Once their stay is over, they can check out with the receptionist. If a guest can no longer make their stay, they have the option to cancel their booking 24 hours before. Draw the use…arrow_forwardQUESTION 1 Create a Use Case Diagram for the below scenario: In The University of Technology and Applied Sciences Sur Library Systems, whenever a new books arrives to the university that books information will be entered by the inventory officer into the inventory. Library staff will allow the students to borrow the books and also return the books. Students in the university can search the books and reserve that book automatically to borrow. Also there is a Library manager who will have permission to print the books titles, delete the book copy information, view overdue or books which are not returned on time and also view who has reserved the books in advance. Now draw the use case diagram by identifying actors, use cases etc.arrow_forwardA company has various rules for how payments to suppliers are to be authorized.Some payments are in response to an approved purchase order. For approved purchase orders under $5,000, the accountingclerk can immediately issue a check againstthat purchase order and sign the check. Forapproved purchase orders between $5,000and $10,000, the accounting clerk can immediately issue a check but must additionallyobtain a second signature. Payments for approved purchase orders over $10,000 alwaysrequire the approval of the accounting manager to issue the check as well as the signature of two accounting clerks. Payments thatare not covered by a purchase order that areunder $5,000 must be approved by the accounting manager and a departmental manager who will absorb the cost of the paymentinto that department’s budget. Such checkscan be signed by a single accounting clerk.Payments that are not covered by a purchaseorder that are between $5,000 and $10,000must be approved by the accounting…arrow_forward
- Given the ER-diagrams shown below, describe (in anorganized way) as much as you can about the real worldthat the diagram represents. Be sure to identify what eachentity are relationship are and to describe all constraintsrelated to them.arrow_forwardTo illustrate, take a look at internal control over collections of receivables. What kind of employment must be kept out of the credit department in order to keep the company's cash safe? To what extent might an employee of the company's credit department do harm?arrow_forwardThree of the mentors started writing notes for the CS Subjects and before they started they had set a target to finish the work on a certain date. But due to some important work these mentors had to take leave, which resulted in the delay of 3 days from the target date to be finished. Mentor A took 2 days more leave than that of Mentor C and Mentor B took 4 days more leave than that of Mentor C. What is the total number of days for which Mentor C was on leave?arrow_forward
- Draw an ER Diagram: A suspect steals at least one car and may steal many cars. A car is stolen by one and only one customer.arrow_forwardFor this assignment you are to find 3 real-world examples of identity theft, preferably medical id theft, but any type will be accepted. One of the examples should be your own if you were an id theft victim (I personally have been a financial id theft victim twice) or someone you know. This will allow you to know the details of how the theft occurred and how it was handled. One of the examples must come from research news stories and other resources found on the Web. Provide a link to each website in your report.. The final example may be personal or a news story. For each case, identify the type of ID theft that occurred, and answer these questions: what did the thief do (if known) to acquire the information, how was it discovered, what were the damages incurred, how long did it take to resolve the problems caused by the id theft?.arrow_forwardDraw an ER Diagram, or EER Diagram as appropriate, for each of these scenarios. A soccer league has a set of teams, each of which has a team ID number, name, stadium name, and location (city). Each team has many players, and each player belongs to only one team. Each player has a player ID number, name, date of birth, start year, and a jersey number. Teams play matches. In each match there is a host team and a guest team. Information about a given match includes the date on which the game is played, and the score (one value for the guest team and one value for the host team). The league has referees, each of which as a referee ID number, a name, date of birth, and start year. Each match is assigned three referees, one of which is designated as the main referee (the other two are assistant referees). Note that a referee may be the main referee for some matches and an assistant referee on others. [Hint: Make Match its own entity type. Include two relationships between Team and Match,…arrow_forward
- Create a Class Diagram of this Bank Management Sytem, using this scenario (see attached photo) Take note: Do not take a shortcut on making the diagram, you must understand the flow of the scenarioarrow_forwardQ1. Consider the given scenario for UML Modelling. We need to develop a website for online survey conduction. On this website, administrators can prepare a questionnaire for the survey and share it via email to the people who are registered users of the website. Once the survey is completed by end users, the web site manager would provide an analysis of the survey results and other feedback reports in any form like graphical or textual. Create a use case diagram for the complete system given in the scenario specifying primary and secondary actors whichever are applicable based on the given scope.arrow_forwardFor selection sizes where the necessary value is less than or equal to 15, please elaborate on how you may hazard an estimate. I'm wondering how large a pool of potential employees you expect there to be. If the values in the same histogram have a normal distribution between 11 and 15, then an estimated value of 13 may be used as the selection criteria. Simply respond to this inquiry with some text.arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningFundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning